...
首页> 外文期刊>Complexity >Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications
【24h】

Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications

机译:轻量级加密算法,用于在复杂的物联网上猜测攻击保护

获取原文
           

摘要

As the world keeps advancing, the need for automated interconnected devices has started to gain significance; to cater to the condition, a new concept Internet of Things (IoT) has been introduced that revolves around smart devices? conception. These smart devices using IoT can communicate with each other through a network to attain particular objectives, i.e., automation and intelligent decision making. IoT has enabled the users to divide their household burden with machines as these complex machines look after the environment variables and control their behavior accordingly. As evident, these machines use sensors to collect vital information, which is then the complexity analyzed at a computational node that then smartly controls these devices? operational behaviors. Deep learning-based guessing attack protection algorithms have been enhancing IoT security; however, it still has a critical challenge for the complex industries’ IoT networks. One of the crucial aspects of such systems is the need to have a significant training time for processing a large dataset from the network?s previous flow of data. Traditional deep learning approaches include decision trees, logistic regression, and support vector machines. However, it is essential to note that this convenience comes with a price that involves security vulnerabilities as IoT networks are prone to be interfered with by hackers who can access the sensor/communication data and later utilize it for malicious purposes. This paper presents the experimental study of cryptographic algorithms to classify the types of encryption algorithms into the asymmetric and asymmetric encryption algorithm. It presents a deep analysis of AES, DES, 3DES, RSA, and Blowfish based on timing complexity, size, encryption, and decryption performances. It has been assessed in terms of the guessing attack in real-time deep learning complex IoT applications. The assessment has been done using the simulation approach and it has been tested the speed of encryption and decryption of the selected encryption algorithms. For each encryption and decryption, the tests executed the same encryption using the same plaintext for five separate times, and the average time is compared. The key size used for each encryption algorithm is the maximum bytes the cipher can allow. To the comparison, the average time required to compute the algorithm by the three devices is used. For the experimental test, a set of plaintexts is used in the simulation—password-sized text and paragraph-sized text—that achieves target fair results compared to the existing algorithms in real-time deep learning networks for IoT applications.
机译:随着世界一直在推进,对自动互连设备的需求已开始增强意义;为了迎合条件,引入了一个新的概念(物联网),围绕智能设备旋转?概念。使用IoT的这些智能设备可以通过网络彼此通信,以获得特定的目标,即自动化和智能决策。由于这些复杂的机器照顾环境变量并相应地控制其行为,因此用户使用户将其家庭负担除以机器。如apidant,这些机器使用传感器来收集重要信息,然后在计算节点上分析的复杂性,然后巧妙地控制这些设备?操作行为。基于深度学习的猜测攻击保护算法一直在提高物联网安全;但是,它仍然对复杂的行业的物联网网络具有危急挑战。此类系统的一个关键方面是需要具有从网络中处理大型数据集的重要培训时间。传统的深度学习方法包括决策树,逻辑回归和支持向量机。但是,必须注意,这方面具有涉及安全漏洞的价格,因为IoT网络易于被热心驾驶的黑客受到干扰,后来利用它用于恶意目的。本文介绍了密码算法的实验研究,将加密算法类型分类为非对称和非对称加密算法。它提出了基于时序复杂性,大小,加密和解密性能的AES,DES,3DES,RSA和Blowfish的深度分析。它已经在实时深度学习复杂的物联网应用中的猜测攻击方面进行了评估。使用模拟方法进行了评估,已经测试了所选加密算法的加密速度和解密。对于每个加密和解密,测试使用相同的纯度执行相同的加密,用于五次单独的时间,并比较平均时间。每个加密算法使用的密钥尺寸是密码可以允许的最大字节。为了比较,使用三个设备计算算法所需的平均时间。对于实验测试,在模拟密码大小文本和段大小的文本中使用一组明文 - 与现有的IOT应用程序中的实时深度学习网络中的现有算法相比,实现了目标公平结果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号